Chapter 1 Overview of Wireless Standards, Organizations, and Fundamentals.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
CH1 CWNA Certification Questions. Network Architecture Model What are the layers of the Network Architecture Model? – Core – Distribution – Access.
Chapter - 11 CWNA Certified Wireless Network Administrator Introduction to Wireless LANs.
CS 350 Chapter-12 Wireless Technologies. Wireless Agencies & Standards AgencyPurposeWeb Site Institute of Electrical and Electronics Engineers (IEEE)
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Exploring Wireless Networking.
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
Wireless Fundamentals Chapter 6 Introducing Wireless Regulation Bodies, Standards, and Certifications.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Security+ Guide to Network Security Fundamentals, Third Edition
Overview.  UMTS (Universal Mobile Telecommunication System) the third generation mobile communication systems.
RF Considerations for wireless communications Jose Antonio Echenique.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wi-Fi By: Michael Gutierrez. Table of Contents I. Introduction I. Introduction II. Governing Standards Body II. Governing Standards Body III. History.
Introduction to Wireless Networking Module-01 Overview of Wireless Standards, Organizations and Technology Jerry Bernardini Community College of Rhode.
Module contents Technologies overview Spread Spectrum Modulation
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 01. Introduction to Wireless LANs.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Fundamental of wireless network.  Heinrich Hertz discovered and first produced radio waves in 1888 and by 1894 the modern way to send a message over.
ESTeem Training Class ESTeem Overview. ESTeem Product Categories Licensed Serial – Long Range Application – Exclusive Use of FCC Frequency – PLC Emulation.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
LESSON Networking Fundamentals Understand Wireless Networking.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Chapter 11: Wireless LANs Business Data Communications, 6e.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 1 Overview of Wireless Standards, Organizations, and Fundamentals.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Chapter 01 Wireless Standards, Organizations, and Applications Center for Information Technology.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Lecture 24 Wireless Network Security
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
©F.M. Rietti Radio Wave Communication Fundamentals.
2001/10/26 Prof. Huei-Wen Ferng 1 Chapter 4 Wireless LAN Technologies and Products.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
COMPUTER FUNDAMENTALS David Samuel Bhatti
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Chapter-7 Basic Wireless Concepts and Configuration.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Chapter 01 Wireless Standards, Organizations, and Applications
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
How To Set Up A Wireless Network
expanded by Jozef Goetz, 2014 The McGraw-Hill Companies, Inc., 2007
Wireless LAN Security 4.3 Wireless LAN Security.
Wireless LAN Technologies and Products
Presentation transcript:

Chapter 1 Overview of Wireless Standards, Organizations, and Fundamentals

Exam Essentials Know the three industry organizations –Understand the roles and responsibilities of the regulatory domain authorities, the IEE, and the Wi-Fi Alliance. Understand Core, Distribution and Access –Know where technology is deployed in fundamental network design Understand wavelength, frequency, amplitude, and phase –Know the definitions of each RF characteristics Understand the concepts of modulation –ASK, FSK, PSK are three carrier signal modulation techniques

History of WLAN Trace back to 19 th century scientists –Radio Frequency WWII –Tramsitting encrypted plans over RF Spread Spectrum Technology created 1970s-Aloha Net 1990s-Early commercial development Pg 2

Standards Organizations FCC IEEE Wi-Fi Alliance ISO Pg 3

FCC Regulates Communication in the US Regulate Licensed and Unlicensed –Wireless LAN mostly in unlicensed Regulates: –Frequency –Bandwidth –Maximum Power of the intentional Radiator –Maximum equivalent isotropically radiated power (EIRP) –Use (indoor and/or outdoor) Pg 3

FCC Regulates Communication in the US Regulate Licensed and Unlicensed –Wireless LAN mostly in unlicensed Regulates: –Frequency –Bandwidth –Maximum Power of the intentional Radiator –Maximum equivalent isotropically radiated power (EIRP) –Use (indoor and/or outdoor) Pg 3

Federal Communications Commission Manage RF for USA wireless can use both licensed and unlicensed frequencies Unlicensed means no cost to users –2.4 Ghz industrial, scientific and Medical (ISM) –5 Ghz Unlicensed National Inforamtion Infrastructure (UNII) band Pg 5

ITU-R Manages global spectrum of RF Pg 6

IEEE Defines the 802 series standards –802.3 Ethernet – Wireless Document the technical and equipment basics –Can be different interpretations Pg 7

Wi-Fi Alliance Starting with b manufacturers formed WECA –Promote technology –Support interoperability In 2000, WECA became WiFi Alliance Pg 8

Interoperability Certifications Addressed the issue of standards Help growth and progression Allow interoperability Pg 8

Wi-Fi Protected Access (WPA) Certification Overview Created due to weak security in initial standards Interim solution before i –Temporal Key Integrity Protocol (TKIP) –Passphrase –802.1X/EAP Two Modes –Personal Home Office –Enterprise Larger Deployment (Servers) Pg 8

Wi-Fi Protected Access 2 (WPA 2.0) Certification Overview Post i –WPA 2.0 Personal and Enterprise More advanced security –Personal mode security uses a passphrase Generates a 256 bit preshared key –Enterprise mode uses 802.1X/EAP Port based authentication designed for enterprises Strong security and external authentication Pg 8

Wi-Fi Protected Access 2 (WPA 2.0) Certification Overview WiFi Alliance Security Mechanism Authentication Mechanism Cipher Suite/Encryption Mechanism WPA-PersonalPassphraseTKIP/RC4 WPA_Enterprise802.1x/EAPTKIP/RC4 WPA2.0 PersonalPassphraseCCM/AES or TKIP/RC x/EAPCCM/AES or TKIP/RC4 Pg 8

Wi-Fi Multimedia (WMM) Certification Overview Proactive certification for 802.1e –Address QOS for wireless networks WMM Validates the features of e –Vendor neutral QOS approach –Ciritical for interoperability Pg 8

Wi-Fi Multimedia Power Save (WMM-PS) Certification Overview Designed for Mobile devices with battery issues –VoIP Phones –Notebooks –PDAs –Headsets –Mice –Keyboards Allow “dozing” to save battery May affect performance Pg 8

Wi-Fi Protected Setup (WPS) Certification Overview Designed for simple set up of wireless for SOHO networks Requires support for two types of authentication –Push Button Config (PBC) –PIN based config Enables automatic configuration of network names and WPA2 security Both methods need to be supported Near Field Communications also supported Pg 8

ISO Identifies standards for business, government and society Created the OSI model for computers networking –Not implemented, but often referenced Should understand the layers Pg 11

OSI Model –Layer 7- Application –Layer 6-Presentation –Layer 5- Session –Layer 4- Transport –Layer 3-Network –Layer 2-Data Link LLC MAC –Layer 1-Physical Please Do Not Throw Sausage Pizza Away All People Seem To Need Data Processing Pg 11

Core, Distribution, Access Core –No routing-High Speed Switching –Redundant Solutions Distribution –Router Traffic between LANS/VLANS –Wireless Bridges can operate here Access –Slower delivery to end user devices –To the desktop – Mostly implemented at access layer Access points Pg 12

Communications Fundamentals Most people have a basic idea about transfer of data This section gives more background on fundamental communications for wireless Pg 14

Carrier Signals Need to be able to transmit two states: –1 or 0 AC or DC alone wont do it, need to alternate or modulate The base signal that is modified is called the Carrier Signal The method of adjusting it is the modulation technique Pg 13

Amplitude and Wavelength Pg 14

Key wave terms Amplitude is a measure of the height of a wave. The higher the amplitude, the higher the power. Wavelength is the measure of the length between peaks. Frequency is how often the peaks come in a period of time, usually measured in Hertz (times per second). Phase is usually used to refer to the relationship between two waveforms of the same frequency. Phase is measured in degrees. Pg 15

Amplitude and Wavelength Pg 15

Phase Pg 15

Keying Methods Signal transmitted from the transceiver has to be manipulated to let receiver distinguish between 1 and 0 –This is the keying method –Also known as modulation techniques Amplitude Shift Keying Frequency Shift Keying Phase Shift Keying Pg 16

Current State Keying Uses the current (in time) value to show a 1 or 0 Whatever the current state is is the binary 0 –Other state is 1 Pg 16

State Transition Keying The change, or lack of change will signify a 0 or 1 0 is a change in state 1 is no change in state of signal Pg 16

Amplitude-Shift Keying Uses the height, or amplitude of the wave to signal change. Current state technique –A shift indicates a change from current signal Pg 17

Frequency-Shift Keying Uses the frequency, or number of cycles per second to indicate change. Current state technique –A shift indicates a change from current signal Used in legacy (older) technologies Pg 17

Phase-Shift Keying Varies the phase of a signal to represent data State Transition technique Pg 17

Phase-Shift Keying-Advanced Can encode multiple bits per symbol as well –Use four different phases Multiple Phase shift Keying Pg 17

Exam Essentials Know the three industry organizations –Understand the roles and responsibilities of the regulatory domain authorities, the IEE, and the Wi-Fi Alliance. Understand Core, Distribution and Access –Know where technology is deployed in fundamental network design Understand wavelength, frequency, amplitude, and phase –Know the definitions of each RF characteristics Understand the concepts of modulation –ASK, FSK, PSK are three carrier signal modulation techniques Pg 21